Yes but it didn't make sense to me a lot, since the example they gave was, for one transaction which had the same public key do the repeat.
Ok, summarizing for future reference, the possible vulnerabilities are:1- A public key generates two signatures using the same nonce.
2- A public key generates a signature reusing a vulnerable nonce, as in case 1 (knowing the value of k allows the derivation of the private key from all signatures that use it).
3- Signatures with vulnerable nonces that have low entropy (few bits).
4- Signatures where the differences between nonces are minimal.
5- Signatures generated with a predictable randomness system, such as Mersenne Twister.
That sums it up, yes. But how would you know that a signature has a vulnerable nonce with low entropy?